Method for protecting against keylogging of user information via an alternative input device

a keylogger and user information technology, applied in the field of computer network security, can solve the problems of largely unused by the majority of computer users, the keylogger program once installed and activated on the computer system is extremely difficult to detect, and the anti-spyware detection program may not identify new and more recent variations of the keylogger program,

Inactive Publication Date: 2009-05-14
IBM CORP
View PDF12 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Keylogging programs, once installed and activated on a computer system, are extremely difficult to detect.
Commercial and freeware spyware detection programs are available, but they are only useful against identified threats listed in the anti-spyware definitions file.
However, standard anti-spyware detection programs may not identify new and more recent variations of spyware keylogger programs.
While this technique will thwart keyloggers, it is largely unused by the majority of computer users because the remapped keyboard departs from what is traditionally coordinated with the “muscle memory” of touch typists familiar with standard keyboard layouts.
However, such approaches carry the risk of being defeated by hackers through the use of capturing and transmitting screen shots of completed forms, which are then analyzed for the confidential information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting against keylogging of user information via an alternative input device
  • Method for protecting against keylogging of user information via an alternative input device
  • Method for protecting against keylogging of user information via an alternative input device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013]Embodiments of the invention provide a method for keylogging prevention by generating an alternate input transaction on another device such as a cellular phone, personnel digital assistant, or any external peripheral device with alphanumeric entry and wireless or wired communication capability that is not susceptible to keylogging. Embodiments of the invention bypass the keyboard of the device, such as a personnel computer (PC) that is the target of the keylogger programs that are able to steal confidential information. The alternative input devices provide transactional information, which includes a password or other confidential data to be input into fields that are to be shielded from key logger observation. The transaction is sent to the PC via, wired link, telephone call, cell phone call, infrared, bluetooth or similar technology.

[0014]Embodiments of the invention utilize a plug-in to a browser application on a PC that generates a transaction that is transmitted to an ent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for protecting against keylogging, the method includes: detecting from a host browser application, a request for a password input by a user of an alphanumeric input device in an entry field of a transaction; inserting a temporary indicator password in the entry field; sending an identifier of the host application with the temporary indicator password to an alternative device; retrieving a user assigned password stored in a table in the alternative device in response to matching the identifier of the host application and the temporary indicator password; sending the user assigned password to the host application; inserting the user assigned password in place of the temporary indicator password in the entry field; and sending the transaction to a server for verification and further processing.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates generally to computer network security and, more particularly, to a method, article, and system for preventing password theft through unauthorized keylogging.[0003]2. Description of the Related Art[0004]Keylogging is a technological process of monitoring computer activity by recording, transmitting, and examining the characters typed on a computer keyboard. Employers monitoring employee productivity, typically involving clerical tasks sometimes use the keylogging technique. Other, more nefarious implementations of keylogging programs involve espionage, such as those embodied in spyware programs. These programs attempt to gather confidential information, such as a text string including an account name and password, and particularly a text string of keyboard strokes following input of a particular web site address. For example, a mouse click on a web browser icon displays the configured home ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32
CPCG06F21/35G06F21/43H04W12/06H04L63/0853H04L63/18H04L63/0838H04W12/068
Inventor DELIA, WAYNE M.KELLEY, EDWARD E.MOTIKA, FRANCO
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products